Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

V Biometric:- It is a type of technical security system in

which human body parts are used as input.


V Example:- Finger print, face recognizer, iris scanner,
etc.
V VPR is also a type of biometric.
V Vascular pattern recognition is that which makes use
of vein patterns of human hand to create templates to
different users. Along with fingerprint analysis and
iris scanning, vein pattern authentication is fast
becoming the talk of the town.
Why we use VPR? (1)

V ˜inceit uses vein·s


image as input so it
can·t be copied.

of veins
V ˜tructure
does not change as
passing of age.
V Itcan be used
externally as input
because it isn·t
affected by water or
any externals.

V Noneed of any user


name or password.
V Wecan use any
posture of hand as
input.
V Near-infrared rays
generated from a bank of
LEDs penetrate the
finger or hand and are
absorbed by the
hemoglobin in the blood.
V The areas in which the
rays are absorbed (i.e.,
veins) appear as dark
areas similar to a shadow
in an image taken by a
Charge-Coupled Device
(CCD) camera.
V Image processing
can then construct a
vein pattern from the
captured image.
V Next this pattern is
digitized and
compressed so that it
can be registered as
a template and save
in database.
V In order to check the legality of travellers from one country to
another, hand vascular scanner is used in immigration industry.
V Airports are other places, where the technology is used for
authorized check-in and check-out.
V For network and computer access, vascular pattern recognition is
used to differentiate authorized users from unauthorized ones.
V ATM and credit card frauds are also controlled using this
technology at designated places.
V Government offices, insurance companies and law enforcement
bodies are also using this technology.
V VPR is a powerful tool to secure our
networks such as banks, offices and
personal data. It provides high security
and reduces the incidence of
unauthorized access in sensitive areas.
But as no technology is foolproof there
are some loop holes in this technology
which have yet to be covered.
ð 

You might also like